Debians sikkerhedsbulletin
DSA-594-1 apache -- bufferoverløb
- Rapporteret den:
- 17. nov 2004
- Berørte pakker:
- apache
- Sårbar:
- Ja
- Referencer i sikkerhedsdatabaser:
- I Mitres CVE-ordbog: CVE-2004-0940.
- Yderligere oplysninger:
-
Two vulnerabilities have been identified in the Apache 1.3 webserver:
- CAN-2004-0940
"Crazy Einstein" har opdaget en sårbarhed i modulet "mod_include", hvilket kunne forårsage et bufferoverløb og kunne gøre det muligt at udføre vilkårlig kode.
- Ingen sårbarheds-id
Larry Cashdollar har opdaget et potentielt bufferoverløb i værktøjet htpasswd, hvilket kunne udnyttes når user-supplied blev overført til programmet via et CGI- (PHP-, ePerl- eller ...) program.
I den stabile distribution (woody) er disse problemer rettet i version 1.3.26-0woody6.
I den ustabile distribution (sid) er disse problemer rettet i version 1.3.33-2.
Vi anbefaler at du opgraderer dine apache-pakker.
- CAN-2004-0940
- Rettet i:
-
Debian GNU/Linux 3.0 (woody)
- Kildekode:
- http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6.dsc
- http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6.diff.gz
- http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26.orig.tar.gz
- http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6.diff.gz
- Arkitekturuafhængig komponent:
- http://security.debian.org/pool/updates/main/a/apache/apache-doc_1.3.26-0woody6_all.deb
- Alpha:
- http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_alpha.deb
- http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_alpha.deb
- http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_alpha.deb
- http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_alpha.deb
- ARM:
- http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_arm.deb
- http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_arm.deb
- http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_arm.deb
- http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_arm.deb
- Intel IA-32:
- http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_i386.deb
- http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_i386.deb
- http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_i386.deb
- http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_i386.deb
- Intel IA-64:
- http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_ia64.deb
- http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_ia64.deb
- http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_ia64.deb
- http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_ia64.deb
- HPPA:
- http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_hppa.deb
- http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_hppa.deb
- http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_hppa.deb
- http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_hppa.deb
- Motorola 680x0:
- http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_m68k.deb
- http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_m68k.deb
- http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_m68k.deb
- http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_m68k.deb
- Big endian MIPS:
- http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_mips.deb
- http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_mips.deb
- http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_mips.deb
- http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_mips.deb
- Little endian MIPS:
- http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_mipsel.deb
- http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_mipsel.deb
- http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_mipsel.deb
- http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_mipsel.deb
- PowerPC:
- http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_powerpc.deb
- http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_powerpc.deb
- http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_powerpc.deb
- http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_powerpc.deb
- IBM S/390:
- http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_s390.deb
- http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_s390.deb
- http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_s390.deb
- http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_s390.deb
- Sun Sparc:
- http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_sparc.deb
- http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_sparc.deb
- http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_sparc.deb
- http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_sparc.deb
MD5-kontrolsummer for de listede filer findes i den originale sikkerhedsbulletin.